Title: TechSoup Healthy
1TechSoup Healthy Secure ComputingTraining for
the Accidental TechieFebruary 6, 2008
Remember to call 866-740-1260 Use access code
6339392 Please have the workbook printed and
ready. Download it herewww.techsoup.org/hsc/page
7475.cfm
Sponsored by United Way Bay Area
2Using ReadyTalk
- All lines will be muted.
- Use the chat box or raise your hand to ask a
question. When your name is called, unmute your
phone by pressing 7. To remute press 6. - If you lose the internet connection, reconnect
following the same instructions you followed at
the start of the training. - If you lose the phone connection, re-dial the
conference phone number and re-join.
3Webinar Presenters
Volunteers Jennifer Cropper Joe Salrin Yann
Toledano
Kevin Lo
Kami Griffiths
4Thank you!
5Participant profile
6Your technology challenges
- System Administration, and keeping performance at
or near optimal level without "wasting" time
trying to accomplish this. - Developing a system that can help us be more
efficient. - Old equipment, old computer knowledge, old world
thinking. - Lack of basic knowledge regarding security and
maintenance issues for PC users. - Not completing routine maintenance defrags, disk
cleanups, and disk checks.
- Keeping our cobbled-together systems working and
coaxing the greatest benefit out of them as we
can. - Keeping up with changes done by different people
and maintaining 4 computers. - Keeping up with changes in technology and
protecting against security threats. - Routine maintenance and virus issues.
- We have very outdated in software and hardware.
7Objectives
- Understand what technology your nonprofit has and
how to document it. - Learn what the crucial security and maintenance
tasks are and develop a schedule. - Learn the importance of data backup and the
options available. - Learn about ways to track technical problems.
- Understand what software and hardware your
organization needs. - Learn more about TechSoup Stock.
8Technology Plan
- Do you have a technology plan?
9Why have a Technology Plan?
- Use technology effectively to further your
mission - Purchase the right equipment for your needs
- Obtain funding and save money
- Avoid crises
- Use staff time more effectively
10Technology Planning Steps
- Envision
- Inventory
- Assess
- Act
Modeled after TechAtlas www.techatlas.org
11Technology Plan Envision
- Envision
- Inventory
- Assess
- Act
12Technology Plan Inventory
- Envision
- Inventory
- Assess
- Act
- Hardware software
- Tools
- TechAtlas www.techatlas.com
- Belarc www.belarc.com
13Technology Plan Assess
- Envision
- Inventory
- Assess
- Act
- Technology skills
- Tool
- TechAtlas www.techatlas.com
14Technology Plan Act
- Envision
- Inventory
- Assess
- Act
- Plan
- Budget
- Staff
- Fundraise
15TechAtlas www.techatlas.org
16Taking inventory Windows XP
17Taking inventory Windows 2000
18Taking inventory Mac OS X
19Inventory Activity
- Turn to page 4 in the Workbook
- Complete a hardware inventory on your computer
- Raise your hand when youre finished
20Out with the old
- The zipcode searchable listings for hardware
donors at www.techsoup.org/recycle/donate - Computer Takeback Campaigns List of responsible
recyclers www.computertakeback.com/the_solutions/
recyclers_map.cfm
- Here are some other listings for end-of-life
electronics recyclers for 5 year old and older
equipment - Electronics Recycling www.electronicsrecycling.ne
t/search/search.aspx - The National Recycling Coalitionwww.electronicsr
ecycling.net/search/search.aspx - The National Safety Councilwww.nsc.org/ehc/epr2/
recycler.htm - The Electronic Industries Alliance listings
www.eiae.org/ - International Association of Electronics
Recyclers (IAER) www.iaer.org/search/iaersearch.c
fm
21Questions Comments
- Click the raise hand button to speak or type in
the chat box.
22Know your network
- Peer-to-Peer
- Client Server
- Managed Network
23Network options
24Peer-to-Peer
- Size
- Security
- Growth
- Training
- Hosting Resources
25Network options
26Client Server
- Optimization
- Centralization
- Security
- Redundancy and Back-up
27Network options
28Managed Network
- Remote Access
- Virus/Spam Protection
- Backup and Restore
- Upgrades
29What does your network look like?
- Turn to page 11 of the workbook
- One a blank sheet of a paper sketch out your
network. - Raise your hand when youre finished
30Questions Comments
- Click the raise hand button to speak or type in
the chat box.
3110 Minute Break
32Security common threats
- Physical theft
- Virus, spyware, ad-ware, phishing
- Compromised network
- Natural disaster
33Computer virus
- A computer program that can copy itself and
infect a computer without permission or knowledge
of the user.
34Spy-ware
- Computer software installed on a computer to
intercept or take partial control over the user's
interaction with the computer, without the user's
informed consent.
35Spy-ware
- Computer software installed on a computer to
intercept or take partial control over the user's
interaction with the computer, without the user's
informed consent.
36Phishing
- The act of acquiring sensitive information, such
as usernames, passwords and credit card details,
by posing as a trustworthy entity through
electronic communication.
37Compromised network
- No firewall
- Open wireless connection
- No data backup
- Weak passwords
38Natural disaster
39Your best defense
- Physical locks
- Antivirus, anti-spyware, anti-spam
- Firewall secure internet connection
- Data backup
- Training
40Maintenance Updates
- Update your operating system and antivirus
program - Weekly maintenance
- Delete temporary files
- Monthly maintenance
- Scan disk cleanup
- Disk defragmentation
- Spybot Search Destroyer
- Adaware
- Yearly maintenance
- Delete unused programs
- Physically clean it
41Automatic updates XP
42Automatic updates Win2000
43Automatic updates Win2000
44Automatic updates Win2000
45Automatic updates Mac
46Review what weve covered
- Understand your nonprofits technology
- Learn how to document what you have
- Learn about crucial security threats
- Develop a maintenance schedule
47Questions Comments
- Click the raise hand button to speak or type in
the chat box.
48Tomorrows agenda
- Data Back-up
- Software Recommendations
- Hardware Recommendations
- Learn about TechSoup Stock
49Thank you!
- See you online tomorrow at 100pm PST